The port data is exclusively visible at the network layer. Within the DMA process, we solely observe the data being read and written. The CPU executes computational cycles, while DMA seizes control of the clock for storing or transmitting data to peripherals, which is captured at the physical layer.
Example:
1.Physical layer: Monitoring in bits(monitoring is eavesdropping, jamming, floods, power manipulation)
2.Data Link layer: Monitoring by frames (ARP spoofing/poisoning, switches, MAC flooding)
3.Network layer: Monitoring packets and datagram (NAT monitoring)
4.Transport layer: Monitoring by segments (SYN Flood, DoS & DDoS)
5.Session, Presentation & Application layer: Monitors data segments (DNS masquerading/cache poisoning, Password exploitation, String exploitation)
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article